A Method for Identifying and Deciphering Fragile Hash Functions for Smart Device Firmware

A technology of hash functions and smart devices, applied in the field of identification and cracking of fragile hash functions, can solve the problem of low identification false alarm rate, and achieve the effect of improving accuracy and saving time.

Active Publication Date: 2020-07-10
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The embodiment of the present invention provides a method for identifying and cracking the fragile hash function of the firmware of the smart device, which is used to solve the existing lack of a method that is simple to implement and has a low false positive rate for the identification of the fragile hash function of the firmware of the smart device, Defects of accurate positioning and fast cracking automated analysis methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Identifying and Deciphering Fragile Hash Functions for Smart Device Firmware
  • A Method for Identifying and Deciphering Fragile Hash Functions for Smart Device Firmware
  • A Method for Identifying and Deciphering Fragile Hash Functions for Smart Device Firmware

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0050] Aiming at the problems of high false alarm rate, inaccurate positioning, and high difficulty in cracking the fragile hash function of firmware, the present invention provides a method for identifying and cracking the fragile hash function of smart device firmware, which can quickly and effectively Identify and locate some vulnerable hash fu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for identifying and cracking a fragile hash function for firmware of intelligent equipment, which mainly comprises the following steps of: preprocessing the firmware to obtain a binary file to be analyzed; extracting common characteristics of the fragile hash function which is not influenced by the architecture and the compiling optimization options or is influenced by the architecture and the compiling optimization options to be smaller than a preset threshold value; carrying out numerical processing on the features, training and testing the feature data, constructing a reliable neural network model based on logistic regression, and carrying out firmware fragile hash function identification and positioning based on a structured matching method; structural division and extraction are conducted on codes of the fragile hash function, machine codes or assembly codes are converted into VEX IR statements, a Z3 SMT solving expression executedbased on symbols is constructed, solving constraint conditions are added, a collision value is cracked reversely, and whether the collision value is correct or not is verified. The method has the advantages of being low in false alarm rate, accurate in positioning and high in cracking rate for the fragile hash function of the firmware.

Description

technical field [0001] The embodiment of the present invention relates to the field of function association of intelligent embedded device firmware and binary program function vulnerability mining, and specifically relates to a method for identifying and cracking a fragile hash function of intelligent device firmware. Background technique [0002] In recent years, due to the frequent occurrence of smart device firmware vulnerability attacks, the research and analysis of firmware security has become one of the research priorities and hotspots in the field of information security. Since the operation of embedded devices is practical and has limited computing power, in order to optimize the performance of the devices, some extremely fragile hash functions are used or the standard hash functions are simplified, resulting in security flaws in smart devices, resulting in The security of smart device systems and even the entire network security space is facing a huge threat. There...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F8/52G06F8/53
Inventor 石志强张国栋杨寿国孙利民
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products